2.50
Hdl Handle:
http://hdl.handle.net/10547/270577
Title:
An analytical evaluation of network security modelling techniques applied to manage threats
Authors:
Viduto, Valentina; Maple, Carsten; Huang, Wei
Abstract:
The current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well as the measures that every organisation should consider to put into action. A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.
Citation:
Viduto, V.; Maple, C.; Huang, W.; (2010) "An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats," Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on , pp.117-123, 4-6 Nov. 2010
Publisher:
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Issue Date:
2010
URI:
http://hdl.handle.net/10547/270577
DOI:
10.1109/BWCCA.2010.58
Additional Links:
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5633801
Type:
Conference papers, meetings and proceedings
Language:
en
ISBN:
9780769542362
Appears in Collections:
Centre for Research in Distributed Technologies (CREDIT)

Full metadata record

DC FieldValue Language
dc.contributor.authorViduto, Valentinaen_GB
dc.contributor.authorMaple, Carstenen_GB
dc.contributor.authorHuang, Weien_GB
dc.date.accessioned2013-02-27T16:46:51Z-
dc.date.available2013-02-27T16:46:51Z-
dc.date.issued2010-
dc.identifier.citationViduto, V.; Maple, C.; Huang, W.; (2010) "An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats," Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on , pp.117-123, 4-6 Nov. 2010en_GB
dc.identifier.isbn9780769542362-
dc.identifier.doi10.1109/BWCCA.2010.58-
dc.identifier.urihttp://hdl.handle.net/10547/270577-
dc.description.abstractThe current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well as the measures that every organisation should consider to put into action. A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.en_GB
dc.language.isoenen
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCen_GB
dc.relation.urlhttp://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5633801en_GB
dc.subjectattack graphen_GB
dc.subjectattack treeen_GB
dc.subjectnetwork hardeningen_GB
dc.subjectthreatsen_GB
dc.subjectcomputer securityen_GB
dc.titleAn analytical evaluation of network security modelling techniques applied to manage threatsen
dc.typeConference papers, meetings and proceedingsen
All Items in UOBREP are protected by copyright, with all rights reserved, unless otherwise indicated.